Index: pkg/analyzer/lib/src/generated/resolver.dart |
diff --git a/pkg/analyzer/lib/src/generated/resolver.dart b/pkg/analyzer/lib/src/generated/resolver.dart |
index e12c686381e87cf4e459b577e355b8f285d1a750..d7ff3fb3c2a87d631b74d839654d670bbaf71b80 100644 |
--- a/pkg/analyzer/lib/src/generated/resolver.dart |
+++ b/pkg/analyzer/lib/src/generated/resolver.dart |
@@ -381,7 +381,7 @@ class AngularCompilationUnitBuilder { |
// selector |
AngularSelectorElement selector = null; |
if (!_hasStringArgument(_SELECTOR)) { |
- _reportErrorForAnnotation(AngularCode.MISSING_SELECTOR, []); |
+ _reportErrorForAnnotation(AngularCode.MISSING_SELECTOR); |
isValid = false; |
} else { |
SimpleStringLiteral selectorLiteral = _getStringLiteral(_SELECTOR); |
@@ -478,7 +478,7 @@ class AngularCompilationUnitBuilder { |
} |
// prepare map literal |
if (mapExpression is! MapLiteral) { |
- _reportErrorForNode(AngularCode.INVALID_PROPERTY_MAP, mapExpression, []); |
+ _reportErrorForNode(AngularCode.INVALID_PROPERTY_MAP, mapExpression); |
return; |
} |
MapLiteral mapLiteral = mapExpression as MapLiteral; |
@@ -487,7 +487,7 @@ class AngularCompilationUnitBuilder { |
// prepare property name |
Expression nameExpression = entry.key; |
if (nameExpression is! SimpleStringLiteral) { |
- _reportErrorForNode(AngularCode.INVALID_PROPERTY_NAME, nameExpression, []); |
+ _reportErrorForNode(AngularCode.INVALID_PROPERTY_NAME, nameExpression); |
continue; |
} |
SimpleStringLiteral nameLiteral = nameExpression as SimpleStringLiteral; |
@@ -496,7 +496,7 @@ class AngularCompilationUnitBuilder { |
// prepare field specification |
Expression specExpression = entry.value; |
if (specExpression is! SimpleStringLiteral) { |
- _reportErrorForNode(AngularCode.INVALID_PROPERTY_SPEC, specExpression, []); |
+ _reportErrorForNode(AngularCode.INVALID_PROPERTY_SPEC, specExpression); |
continue; |
} |
SimpleStringLiteral specLiteral = specExpression as SimpleStringLiteral; |
@@ -545,13 +545,13 @@ class AngularCompilationUnitBuilder { |
bool isValid = true; |
// publishAs |
if (!_hasStringArgument(_PUBLISH_AS)) { |
- _reportErrorForAnnotation(AngularCode.MISSING_PUBLISH_AS, []); |
+ _reportErrorForAnnotation(AngularCode.MISSING_PUBLISH_AS); |
isValid = false; |
} |
// selector |
AngularSelectorElement selector = null; |
if (!_hasStringArgument(_SELECTOR)) { |
- _reportErrorForAnnotation(AngularCode.MISSING_SELECTOR, []); |
+ _reportErrorForAnnotation(AngularCode.MISSING_SELECTOR); |
isValid = false; |
} else { |
SimpleStringLiteral selectorLiteral = _getStringLiteral(_SELECTOR); |
@@ -576,7 +576,7 @@ class AngularCompilationUnitBuilder { |
// selector |
AngularSelectorElement selector = null; |
if (!_hasStringArgument(_SELECTOR)) { |
- _reportErrorForAnnotation(AngularCode.MISSING_SELECTOR, []); |
+ _reportErrorForAnnotation(AngularCode.MISSING_SELECTOR); |
isValid = false; |
} else { |
SimpleStringLiteral selectorLiteral = _getStringLiteral(_SELECTOR); |
@@ -600,7 +600,7 @@ class AngularCompilationUnitBuilder { |
bool isValid = true; |
// name |
if (!_hasStringArgument(_NAME)) { |
- _reportErrorForAnnotation(AngularCode.MISSING_NAME, []); |
+ _reportErrorForAnnotation(AngularCode.MISSING_NAME); |
isValid = false; |
} |
// create |
@@ -630,22 +630,22 @@ class AngularCompilationUnitBuilder { |
} |
} |
- void _reportErrorForAnnotation(ErrorCode errorCode, List<Object> arguments) { |
+ void _reportErrorForAnnotation(ErrorCode errorCode, [List<Object> arguments]) { |
_reportErrorForNode(errorCode, _annotation, arguments); |
} |
- void _reportErrorForArgument(String argumentName, ErrorCode errorCode, List<Object> arguments) { |
+ void _reportErrorForArgument(String argumentName, ErrorCode errorCode, [List<Object> arguments]) { |
Expression argument = _getArgument(argumentName); |
_reportErrorForNode(errorCode, argument, arguments); |
} |
- void _reportErrorForNode(ErrorCode errorCode, AstNode node, List<Object> arguments) { |
+ void _reportErrorForNode(ErrorCode errorCode, AstNode node, [List<Object> arguments]) { |
int offset = node.offset; |
int length = node.length; |
_reportErrorForOffset(errorCode, offset, length, arguments); |
} |
- void _reportErrorForOffset(ErrorCode errorCode, int offset, int length, List<Object> arguments) { |
+ void _reportErrorForOffset(ErrorCode errorCode, int offset, int length, [List<Object> arguments]) { |
_errorListener.onError(new AnalysisError.con2(_source, offset, length, errorCode, arguments)); |
} |
} |
@@ -851,10 +851,10 @@ class BestPracticesVerifier extends RecursiveAstVisitor<Object> { |
if (rhsType.isDynamic && rhsNameStr == sc.Keyword.DYNAMIC.syntax) { |
if (node.notOperator == null) { |
// the is case |
- _errorReporter.reportErrorForNode(HintCode.UNNECESSARY_TYPE_CHECK_TRUE, node, []); |
+ _errorReporter.reportErrorForNode(HintCode.UNNECESSARY_TYPE_CHECK_TRUE, node); |
} else { |
// the is not case |
- _errorReporter.reportErrorForNode(HintCode.UNNECESSARY_TYPE_CHECK_FALSE, node, []); |
+ _errorReporter.reportErrorForNode(HintCode.UNNECESSARY_TYPE_CHECK_FALSE, node); |
} |
return true; |
} |
@@ -865,19 +865,19 @@ class BestPracticesVerifier extends RecursiveAstVisitor<Object> { |
if (rhsType.isObject || (expression is NullLiteral && rhsNameStr == _NULL_TYPE_NAME)) { |
if (node.notOperator == null) { |
// the is case |
- _errorReporter.reportErrorForNode(HintCode.UNNECESSARY_TYPE_CHECK_TRUE, node, []); |
+ _errorReporter.reportErrorForNode(HintCode.UNNECESSARY_TYPE_CHECK_TRUE, node); |
} else { |
// the is not case |
- _errorReporter.reportErrorForNode(HintCode.UNNECESSARY_TYPE_CHECK_FALSE, node, []); |
+ _errorReporter.reportErrorForNode(HintCode.UNNECESSARY_TYPE_CHECK_FALSE, node); |
} |
return true; |
} else if (rhsNameStr == _NULL_TYPE_NAME) { |
if (node.notOperator == null) { |
// the is case |
- _errorReporter.reportErrorForNode(HintCode.TYPE_CHECK_IS_NULL, node, []); |
+ _errorReporter.reportErrorForNode(HintCode.TYPE_CHECK_IS_NULL, node); |
} else { |
// the is not case |
- _errorReporter.reportErrorForNode(HintCode.TYPE_CHECK_IS_NOT_NULL, node, []); |
+ _errorReporter.reportErrorForNode(HintCode.TYPE_CHECK_IS_NOT_NULL, node); |
} |
return true; |
} |
@@ -1062,7 +1062,7 @@ class BestPracticesVerifier extends RecursiveAstVisitor<Object> { |
if (parenthesizedExpression.parent is MethodInvocation) { |
MethodInvocation methodInvocation = parenthesizedExpression.parent as MethodInvocation; |
if (_TO_INT_METHOD_NAME == methodInvocation.methodName.name && methodInvocation.argumentList.arguments.isEmpty) { |
- _errorReporter.reportErrorForNode(HintCode.DIVISION_OPTIMIZATION, methodInvocation, []); |
+ _errorReporter.reportErrorForNode(HintCode.DIVISION_OPTIMIZATION, methodInvocation); |
return true; |
} |
} |
@@ -1195,7 +1195,7 @@ class BestPracticesVerifier extends RecursiveAstVisitor<Object> { |
// TODO(jwren) After dartbug.com/13732, revisit this, we should be able to remove the |
// !(x instanceof TypeParameterType) checks. |
if (lhsType != null && rhsType != null && !lhsType.isDynamic && !rhsType.isDynamic && lhsType is! TypeParameterType && rhsType is! TypeParameterType && lhsType.isMoreSpecificThan(rhsType)) { |
- _errorReporter.reportErrorForNode(HintCode.UNNECESSARY_CAST, node, []); |
+ _errorReporter.reportErrorForNode(HintCode.UNNECESSARY_CAST, node); |
return true; |
} |
return false; |
@@ -1368,13 +1368,13 @@ class ConstantVerifier extends RecursiveAstVisitor<Object> { |
ConstructorElement constructorElement = element; |
// should 'const' constructor |
if (!constructorElement.isConst) { |
- _errorReporter.reportErrorForNode(CompileTimeErrorCode.NON_CONSTANT_ANNOTATION_CONSTRUCTOR, node, []); |
+ _errorReporter.reportErrorForNode(CompileTimeErrorCode.NON_CONSTANT_ANNOTATION_CONSTRUCTOR, node); |
return null; |
} |
// should have arguments |
ArgumentList argumentList = node.arguments; |
if (argumentList == null) { |
- _errorReporter.reportErrorForNode(CompileTimeErrorCode.NO_ANNOTATION_CONSTRUCTOR_ARGUMENTS, node, []); |
+ _errorReporter.reportErrorForNode(CompileTimeErrorCode.NO_ANNOTATION_CONSTRUCTOR_ARGUMENTS, node); |
return null; |
} |
// arguments should be constants |
@@ -1474,7 +1474,7 @@ class ConstantVerifier extends RecursiveAstVisitor<Object> { |
} |
if (reportEqualKeys) { |
for (Expression key in invalidKeys) { |
- _errorReporter.reportErrorForNode(StaticWarningCode.EQUAL_KEYS_IN_MAP, key, []); |
+ _errorReporter.reportErrorForNode(StaticWarningCode.EQUAL_KEYS_IN_MAP, key); |
} |
} |
return null; |
@@ -1600,7 +1600,7 @@ class ConstantVerifier extends RecursiveAstVisitor<Object> { |
DeferredLibraryReferenceDetector referenceDetector = new DeferredLibraryReferenceDetector(); |
expression.accept(referenceDetector); |
if (referenceDetector.result) { |
- _errorReporter.reportErrorForNode(errorCode, expression, []); |
+ _errorReporter.reportErrorForNode(errorCode, expression); |
} |
} |
@@ -1625,7 +1625,7 @@ class ConstantVerifier extends RecursiveAstVisitor<Object> { |
identical(dataErrorCode, CheckedModeCompileTimeErrorCode.VARIABLE_TYPE_MISMATCH)) { |
_errorReporter.reportError(data); |
} else if (errorCode != null) { |
- _errorReporter.reportError(new AnalysisError.con2(data.source, data.offset, data.length, errorCode, [])); |
+ _errorReporter.reportError(new AnalysisError.con2(data.source, data.offset, data.length, errorCode)); |
} |
} |
} |
@@ -1897,9 +1897,9 @@ class Dart2JSVerifier extends RecursiveAstVisitor<Object> { |
// } else |
if (typeNameStr == _DOUBLE_TYPE_NAME && libraryElement != null && libraryElement.isDartCore) { |
if (node.notOperator == null) { |
- _errorReporter.reportErrorForNode(HintCode.IS_DOUBLE, node, []); |
+ _errorReporter.reportErrorForNode(HintCode.IS_DOUBLE, node); |
} else { |
- _errorReporter.reportErrorForNode(HintCode.IS_NOT_DOUBLE, node, []); |
+ _errorReporter.reportErrorForNode(HintCode.IS_NOT_DOUBLE, node); |
} |
return true; |
} |
@@ -1963,13 +1963,13 @@ class DeadCodeVerifier extends RecursiveAstVisitor<Object> { |
if (lhsResult != null) { |
if (lhsResult.value.isTrue && isBarBar) { |
// report error on else block: true || !e! |
- _errorReporter.reportErrorForNode(HintCode.DEAD_CODE, node.rightOperand, []); |
+ _errorReporter.reportErrorForNode(HintCode.DEAD_CODE, node.rightOperand); |
// only visit the LHS: |
_safelyVisit(lhsCondition); |
return null; |
} else if (lhsResult.value.isFalse && isAmpAmp) { |
// report error on if block: false && !e! |
- _errorReporter.reportErrorForNode(HintCode.DEAD_CODE, node.rightOperand, []); |
+ _errorReporter.reportErrorForNode(HintCode.DEAD_CODE, node.rightOperand); |
// only visit the LHS: |
_safelyVisit(lhsCondition); |
return null; |
@@ -2020,12 +2020,12 @@ class DeadCodeVerifier extends RecursiveAstVisitor<Object> { |
if (result != null) { |
if (result.value.isTrue) { |
// report error on else block: true ? 1 : !2! |
- _errorReporter.reportErrorForNode(HintCode.DEAD_CODE, node.elseExpression, []); |
+ _errorReporter.reportErrorForNode(HintCode.DEAD_CODE, node.elseExpression); |
_safelyVisit(node.thenExpression); |
return null; |
} else { |
// report error on if block: false ? !1! : 2 |
- _errorReporter.reportErrorForNode(HintCode.DEAD_CODE, node.thenExpression, []); |
+ _errorReporter.reportErrorForNode(HintCode.DEAD_CODE, node.thenExpression); |
_safelyVisit(node.elseExpression); |
return null; |
} |
@@ -2045,13 +2045,13 @@ class DeadCodeVerifier extends RecursiveAstVisitor<Object> { |
// report error on else block: if(true) {} else {!} |
Statement elseStatement = node.elseStatement; |
if (elseStatement != null) { |
- _errorReporter.reportErrorForNode(HintCode.DEAD_CODE, elseStatement, []); |
+ _errorReporter.reportErrorForNode(HintCode.DEAD_CODE, elseStatement); |
_safelyVisit(node.thenStatement); |
return null; |
} |
} else { |
// report error on if block: if (false) {!} else {} |
- _errorReporter.reportErrorForNode(HintCode.DEAD_CODE, node.thenStatement, []); |
+ _errorReporter.reportErrorForNode(HintCode.DEAD_CODE, node.thenStatement); |
_safelyVisit(node.elseStatement); |
return null; |
} |
@@ -2098,7 +2098,7 @@ class DeadCodeVerifier extends RecursiveAstVisitor<Object> { |
CatchClause lastCatchClause = catchClauses[numOfCatchClauses - 1]; |
int offset = nextCatchClause.offset; |
int length = lastCatchClause.end - offset; |
- _errorReporter.reportErrorForOffset(HintCode.DEAD_CODE_CATCH_FOLLOWING_CATCH, offset, length, []); |
+ _errorReporter.reportErrorForOffset(HintCode.DEAD_CODE_CATCH_FOLLOWING_CATCH, offset, length); |
return null; |
} |
} |
@@ -2124,7 +2124,7 @@ class DeadCodeVerifier extends RecursiveAstVisitor<Object> { |
CatchClause lastCatchClause = catchClauses[numOfCatchClauses - 1]; |
int offset = nextCatchClause.offset; |
int length = lastCatchClause.end - offset; |
- _errorReporter.reportErrorForOffset(HintCode.DEAD_CODE_CATCH_FOLLOWING_CATCH, offset, length, []); |
+ _errorReporter.reportErrorForOffset(HintCode.DEAD_CODE_CATCH_FOLLOWING_CATCH, offset, length); |
return null; |
} |
} |
@@ -2141,7 +2141,7 @@ class DeadCodeVerifier extends RecursiveAstVisitor<Object> { |
if (result != null) { |
if (result.value.isFalse) { |
// report error on if block: while (false) {!} |
- _errorReporter.reportErrorForNode(HintCode.DEAD_CODE, node.body, []); |
+ _errorReporter.reportErrorForNode(HintCode.DEAD_CODE, node.body); |
return null; |
} |
} |
@@ -2168,7 +2168,7 @@ class DeadCodeVerifier extends RecursiveAstVisitor<Object> { |
Statement lastStatement = statements[size - 1]; |
int offset = nextStatement.offset; |
int length = lastStatement.end - offset; |
- _errorReporter.reportErrorForOffset(HintCode.DEAD_CODE, offset, length, []); |
+ _errorReporter.reportErrorForOffset(HintCode.DEAD_CODE, offset, length); |
return; |
} |
} |
@@ -2192,25 +2192,16 @@ class DeadCodeVerifier extends RecursiveAstVisitor<Object> { |
return new EvaluationResultImpl.con1(new DartObjectImpl(null, BoolState.from(false))); |
} |
} |
- // Don't consider situations where we could evaluate to a constant boolean expression with the |
- // ConstantVisitor |
-// |
+ // Don't consider situations where we could evaluate to a constant boolean |
+ // expression with the ConstantVisitor |
// else { |
-// |
// EvaluationResultImpl result = expression.accept(new ConstantVisitor()); |
-// |
// if (result == ValidResult.RESULT_TRUE) { |
-// |
// return ValidResult.RESULT_TRUE; |
-// |
// } else if (result == ValidResult.RESULT_FALSE) { |
-// |
// return ValidResult.RESULT_FALSE; |
-// |
// } |
-// |
// return null; |
-// |
// } |
return null; |
} |
@@ -5932,7 +5923,7 @@ class ImportsVerifier extends RecursiveAstVisitor<Object> { |
*/ |
void generateDuplicateImportHints(ErrorReporter errorReporter) { |
for (ImportDirective duplicateImport in _duplicateImports) { |
- errorReporter.reportErrorForNode(HintCode.DUPLICATE_IMPORT, duplicateImport.uri, []); |
+ errorReporter.reportErrorForNode(HintCode.DUPLICATE_IMPORT, duplicateImport.uri); |
} |
} |
@@ -5954,7 +5945,7 @@ class ImportsVerifier extends RecursiveAstVisitor<Object> { |
continue; |
} |
} |
- errorReporter.reportErrorForNode(HintCode.UNUSED_IMPORT, unusedImport.uri, []); |
+ errorReporter.reportErrorForNode(HintCode.UNUSED_IMPORT, unusedImport.uri); |
} |
} |
@@ -7554,7 +7545,7 @@ class Library { |
Source getSource(UriBasedDirective directive) { |
StringLiteral uriLiteral = directive.uri; |
if (uriLiteral is StringInterpolation) { |
- _errorListener.onError(new AnalysisError.con2(librarySource, uriLiteral.offset, uriLiteral.length, CompileTimeErrorCode.URI_WITH_INTERPOLATION, [])); |
+ _errorListener.onError(new AnalysisError.con2(librarySource, uriLiteral.offset, uriLiteral.length, CompileTimeErrorCode.URI_WITH_INTERPOLATION)); |
return null; |
} |
String uriContent = uriLiteral.stringValue.trim(); |
@@ -7717,7 +7708,7 @@ class LibraryElementBuilder { |
} |
} |
if (hasPartDirective && libraryNameNode == null) { |
- _errorListener.onError(new AnalysisError.con1(librarySource, ResolverErrorCode.MISSING_LIBRARY_DIRECTIVE_WITH_PART, [])); |
+ _errorListener.onError(new AnalysisError.con1(librarySource, ResolverErrorCode.MISSING_LIBRARY_DIRECTIVE_WITH_PART)); |
} |
// |
// Create and populate the library element. |
@@ -7805,7 +7796,7 @@ class LibraryElementBuilder { |
} |
} |
if (hasPartDirective && libraryNameNode == null) { |
- _errorListener.onError(new AnalysisError.con1(librarySource, ResolverErrorCode.MISSING_LIBRARY_DIRECTIVE_WITH_PART, [])); |
+ _errorListener.onError(new AnalysisError.con1(librarySource, ResolverErrorCode.MISSING_LIBRARY_DIRECTIVE_WITH_PART)); |
} |
// |
// Create and populate the library element. |
@@ -10015,12 +10006,12 @@ class OverrideVerifier extends RecursiveAstVisitor<Object> { |
if (_isOverride(element)) { |
if (_getOverriddenMember(element) == null) { |
if (element is MethodElement) { |
- _errorReporter.reportErrorForNode(HintCode.OVERRIDE_ON_NON_OVERRIDING_METHOD, node.name, []); |
+ _errorReporter.reportErrorForNode(HintCode.OVERRIDE_ON_NON_OVERRIDING_METHOD, node.name); |
} else if (element is PropertyAccessorElement) { |
if (element.isGetter) { |
- _errorReporter.reportErrorForNode(HintCode.OVERRIDE_ON_NON_OVERRIDING_GETTER, node.name, []); |
+ _errorReporter.reportErrorForNode(HintCode.OVERRIDE_ON_NON_OVERRIDING_GETTER, node.name); |
} else { |
- _errorReporter.reportErrorForNode(HintCode.OVERRIDE_ON_NON_OVERRIDING_SETTER, node.name, []); |
+ _errorReporter.reportErrorForNode(HintCode.OVERRIDE_ON_NON_OVERRIDING_SETTER, node.name); |
} |
} |
} |
@@ -10212,7 +10203,7 @@ class PubVerifier extends RecursiveAstVisitor<Object> { |
Source pubspecSource = _context.sourceFactory.resolveUri(source, relativePubspecPath); |
if (_context.exists(pubspecSource)) { |
// Files inside the lib directory hierarchy should not reference files outside |
- _errorReporter.reportErrorForNode(HintCode.FILE_IMPORT_INSIDE_LIB_REFERENCES_FILE_OUTSIDE, uriLiteral, []); |
+ _errorReporter.reportErrorForNode(HintCode.FILE_IMPORT_INSIDE_LIB_REFERENCES_FILE_OUTSIDE, uriLiteral); |
} |
return true; |
} |
@@ -10260,7 +10251,7 @@ class PubVerifier extends RecursiveAstVisitor<Object> { |
if (StringUtilities.indexOf5(fullName, 0, 0x2F, 0x6C, 0x69, 0x62, 0x2F) < 0) { |
// Files outside the lib directory hierarchy should not reference files inside |
// ... use package: url instead |
- _errorReporter.reportErrorForNode(HintCode.FILE_IMPORT_OUTSIDE_LIB_REFERENCES_FILE_INSIDE, uriLiteral, []); |
+ _errorReporter.reportErrorForNode(HintCode.FILE_IMPORT_OUTSIDE_LIB_REFERENCES_FILE_INSIDE, uriLiteral); |
return true; |
} |
} |
@@ -10278,7 +10269,7 @@ class PubVerifier extends RecursiveAstVisitor<Object> { |
bool _checkForPackageImportContainsDotDot(StringLiteral uriLiteral, String path) { |
if (StringUtilities.startsWith3(path, 0, 0x2E, 0x2E, 0x2F) || StringUtilities.indexOf4(path, 0, 0x2F, 0x2E, 0x2E, 0x2F) >= 0) { |
// Package import should not to contain ".." |
- _errorReporter.reportErrorForNode(HintCode.PACKAGE_IMPORT_CONTAINS_DOT_DOT, uriLiteral, []); |
+ _errorReporter.reportErrorForNode(HintCode.PACKAGE_IMPORT_CONTAINS_DOT_DOT, uriLiteral); |
return true; |
} |
return false; |
@@ -12937,7 +12928,7 @@ abstract class ScopedVisitor extends UnifyingAstVisitor<Object> { |
* @param node the node specifying the location of the error |
* @param arguments the arguments to the error, used to compose the error message |
*/ |
- void reportErrorForNode(ErrorCode errorCode, AstNode node, List<Object> arguments) { |
+ void reportErrorForNode(ErrorCode errorCode, AstNode node, [List<Object> arguments]) { |
_errorListener.onError(new AnalysisError.con2(source, node.offset, node.length, errorCode, arguments)); |
} |
@@ -12949,7 +12940,7 @@ abstract class ScopedVisitor extends UnifyingAstVisitor<Object> { |
* @param length the length of the location of the error |
* @param arguments the arguments to the error, used to compose the error message |
*/ |
- void reportErrorForOffset(ErrorCode errorCode, int offset, int length, List<Object> arguments) { |
+ void reportErrorForOffset(ErrorCode errorCode, int offset, int length, [List<Object> arguments]) { |
_errorListener.onError(new AnalysisError.con2(source, offset, length, errorCode, arguments)); |
} |
@@ -12960,7 +12951,7 @@ abstract class ScopedVisitor extends UnifyingAstVisitor<Object> { |
* @param token the token specifying the location of the error |
* @param arguments the arguments to the error, used to compose the error message |
*/ |
- void reportErrorForToken(ErrorCode errorCode, sc.Token token, List<Object> arguments) { |
+ void reportErrorForToken(ErrorCode errorCode, sc.Token token, [List<Object> arguments]) { |
_errorListener.onError(new AnalysisError.con2(source, token.offset, token.length, errorCode, arguments)); |
} |
@@ -15054,7 +15045,7 @@ class TypeResolverVisitor extends ScopedVisitor { |
if (type is InterfaceType) { |
ClassElement element = type.element; |
if (element != null && element.isEnum) { |
- reportErrorForNode(enumTypeError, typeName, []); |
+ reportErrorForNode(enumTypeError, typeName); |
return null; |
} |
return type; |